-
公开(公告)号:US20180352005A1
公开(公告)日:2018-12-06
申请号:US16040340
申请日:2018-07-19
申请人: Ajit Gaddam , Selim Aissi , Taeho Kgil
发明人: Ajit Gaddam , Selim Aissi , Taeho Kgil
IPC分类号: H04L29/06
摘要: Systems, devices, apparatuses, and methods of the present invention distribute authentication across multiple users. A data sensitivity model can define the sensitivity of different types of data. When an application requests access to a particular data item, the sensitivity of that data item can be determined. If the data item has a low sensitivity, access to the data item can be granted, if the data item has a high sensitivity, the system can request authentication before granting access to-the data item.
-
公开(公告)号:US20140372754A1
公开(公告)日:2014-12-18
申请号:US14304488
申请日:2014-06-13
申请人: Selim Aissi , Taeho Kgil , Ajit Gaddam
发明人: Selim Aissi , Taeho Kgil , Ajit Gaddam
IPC分类号: H04L29/06
CPC分类号: H04L63/083 , G06F21/36 , G06F2221/2107 , G09C5/00 , H04L9/0861 , H04L63/0428 , H04L63/06 , H04L63/08 , H04L2463/061 , H04L2463/062
摘要: Embodiments of the invention relate to methods of generating and using an image-based derived key. In various embodiments, the image-based derived key may be used to facilitate user authentication and data encryption. For some embodiments, a method is disclosed comprising determining an image-based derived key, wherein the image-based derived key is generated from a selection of authentication images chosen by a user, encrypting data using the image-based derived key, and transmitting the encrypted data.
摘要翻译: 本发明的实施例涉及生成和使用基于图像的导出密钥的方法。 在各种实施例中,基于图像的导出密钥可以用于促进用户认证和数据加密。 对于一些实施例,公开了一种方法,其包括确定基于图像的导出密钥,其中基于图像的导出密钥是从用户选择的认证图像的选择生成的,使用基于图像的派生密钥对数据进行加密,以及发送 加密数据。
-
公开(公告)号:US20170346806A1
公开(公告)日:2017-11-30
申请号:US15677377
申请日:2017-08-15
申请人: Selim Aissi , Taeho Kgil , Ajit Gaddam
发明人: Selim Aissi , Taeho Kgil , Ajit Gaddam
CPC分类号: H04L63/083 , G06F21/36 , G06F2221/2107 , G09C5/00 , H04L9/0861 , H04L63/0428 , H04L63/06 , H04L63/08 , H04L2463/061 , H04L2463/062
摘要: Embodiments of the invention relate to methods of generating and using an image-based derived key. In various embodiments, the image-based derived key may be used to facilitate user authentication and data encryption. For some embodiments, a method is disclosed comprising determining an image-based derived key, wherein the image-based derived key is generated from a selection of authentication images chosen by a user, encrypting data using the image-based derived key, and transmitting the encrypted data.
-
公开(公告)号:US20140373104A1
公开(公告)日:2014-12-18
申请号:US14303461
申请日:2014-06-12
申请人: Ajit Gaddam , Selim Aissi , Taeho Kgil
发明人: Ajit Gaddam , Selim Aissi , Taeho Kgil
IPC分类号: H04L29/06
CPC分类号: H04L63/205 , H04L63/105
摘要: Systems, devices, apparatuses, and methods of the present invention distribute authentication across multiple users. A data sensitivity model can define the sensitivity of different types of data. When an application requests access to a particular data item, the sensitivity of that data item can be determined. If the data item has a low sensitivity, access to the data item can be granted. If the data item has a high sensitivity, the system can request authentication before granting access to the data item.
摘要翻译: 本发明的系统,设备,装置和方法在多个用户之间分发认证。 数据敏感度模型可以定义不同类型数据的灵敏度。 当应用程序请求访问特定数据项时,可以确定该数据项的灵敏度。 如果数据项具有低灵敏度,则可以授予对数据项的访问。 如果数据项具有高灵敏度,则系统可以在授予对数据项的访问权限之前请求认证。
-
公开(公告)号:US20170078267A1
公开(公告)日:2017-03-16
申请号:US15359554
申请日:2016-11-22
申请人: Selim Aissi , Taeho Kgil , Ajit Gaddam
发明人: Selim Aissi , Taeho Kgil , Ajit Gaddam
CPC分类号: H04L63/083 , G06F21/36 , G06F2221/2107 , G09C5/00 , H04L9/0861 , H04L63/0428 , H04L63/06 , H04L63/08 , H04L2463/061 , H04L2463/062
摘要: Embodiments of the invention relate to methods of generating and using an image-based derived key. In various embodiments, the image-based derived key may be used to facilitate user authentication and data encryption. For some embodiments, a method is disclosed comprising determining an image-based derived key, wherein the image-based derived key is generated from a selection of authentication images chosen by a user, encrypting data using the image-based derived key, and transmitting the encrypted data.
摘要翻译: 本发明的实施例涉及生成和使用基于图像的导出密钥的方法。 在各种实施例中,基于图像的导出密钥可以用于促进用户认证和数据加密。 对于一些实施例,公开了一种方法,其包括确定基于图像的派生密钥,其中基于图像的导出密钥是从用户选择的认证图像的选择生成的,使用基于图像的派生密钥对数据进行加密,以及发送 加密数据。
-
公开(公告)号:US20170177694A1
公开(公告)日:2017-06-22
申请号:US15455003
申请日:2017-03-09
申请人: Selim Aissi , Taeho Kgil
发明人: Selim Aissi , Taeho Kgil
CPC分类号: G06F17/30578 , G06F11/1461 , G06F11/1464 , G06F17/30082 , G06F17/30117 , G06F17/30368 , G06F17/30575 , G06F21/602 , G06F21/6209 , G06F2201/80 , G06F2201/82 , G06Q20/3223 , G06Q20/36 , G06Q50/01
摘要: Embodiments of the invention are directed to systems and methods for maintaining coherency between different entities in a distributed system. A coherency module automatically detects a change in state in a first entity, wherein the change in state relates to a change in functional code in the first entity. A synchronization message is transmitted to a second entity to synchronize data in the second entity with data in the first entity as a result of the change in state, The second entity is configured to synchronize the data in the second entity with the data in the first entity after receiving the synchronization message.
-
公开(公告)号:US20150007262A1
公开(公告)日:2015-01-01
申请号:US14318070
申请日:2014-06-27
申请人: Selim Aissi , Taeho Kgil , Gyan Prakash
发明人: Selim Aissi , Taeho Kgil , Gyan Prakash
IPC分类号: H04L29/06
CPC分类号: H04L63/0428 , G06F7/58 , G06F21/60 , G06F21/602 , H04L9/0866 , H04L9/0869 , H04L9/3278 , H04L63/08 , H04L63/123 , H04L2209/56 , H04W12/04
摘要: A dynamic root of trust can be injected in an application module on a client device using a backend server and can be continuously monitored to ensure authenticity, integrity and confidentiality at load time, run time and update time of the application module. The dynamic root of trust can be updated directly from the backend server and can be used to establish a time bound trust chain for the other software modules loaded and executed as part of the application module.
摘要翻译: 信任的动态根源可以使用后端服务器注入到客户端设备上的应用程序模块中,并可以连续监视,以确保在加载时间,运行时间和应用程序模块的更新时间的真实性,完整性和机密性。 可以直接从后端服务器更新信任的动态根,并且可以用于为作为应用程序模块的一部分加载和执行的其他软件模块建立时间限制的信任链。
-
公开(公告)号:US20140331279A1
公开(公告)日:2014-11-06
申请号:US14269999
申请日:2014-05-05
申请人: SELIM AISSI , Taeho Kgil , Gyan Prakash
发明人: SELIM AISSI , Taeho Kgil , Gyan Prakash
IPC分类号: G06F21/60
CPC分类号: G06F21/604 , G06F21/53 , G06F21/57 , G06F21/6218 , G06F2221/2113
摘要: The presenting invention relates to techniques for implementing a secure operating environment for the execution of applications on a computing devices (e.g., a mobile phone). In The secure operating environment may provide a trusted environment with dedicated computing resources to manage security and integrity of processing and data for the applications. The applications may be provided with a variety of security services and/or functions to meet different levels of security demanded by an application. The secure operating environment may include a security engine that enumerates and/or determines the security capabilities of the secure operating environment and the computing device, e.g., the hardware, the software, and/or the firmware of the computing device. The security engine may provide security services desired by applications by choosing from the security capabilities that are supported by the secure operating environment and the computing device.
摘要翻译: 本发明涉及用于实现用于在计算设备(例如,移动电话)上执行应用的安全操作环境的技术。 在安全的操作环境中,可以为受信任的环境提供专用的计算资源来管理应用程序的处理和数据的安全性和完整性。 应用可以被提供有各种安全服务和/或功能以满足应用所要求的不同级别的安全性。 安全操作环境可以包括枚举和/或确定安全操作环境和计算设备(例如计算设备的硬件,软件和/或固件)的安全能力的安全引擎。 安全引擎可以通过从由安全操作环境和计算设备支持的安全功能中进行选择来提供应用所期望的安全服务。
-
公开(公告)号:US20140173686A1
公开(公告)日:2014-06-19
申请号:US14134959
申请日:2013-12-19
申请人: Taeho Kgil , Selim Aissi
发明人: Taeho Kgil , Selim Aissi
IPC分类号: H04L29/06
CPC分类号: H04L63/205
摘要: Techniques for assessing the trustworthiness of a target device that a user device is attempting to communicate with are described. A user device may request one or more trustworthiness attributes of a target device before exchanging data with the target device. The user device may receive the one or more trustworthiness attributes of the target device, and determine, based on the received one or more trustworthiness attributes of the target device, a set of one or more security policies to enforce on a communication channel used for exchanging data between the user device and the target device. A communication channel between the user device and the target device can then be established according to the set of one or more security policies.
摘要翻译: 描述用于评估用户设备尝试与之通信的目标设备的可信度的技术。 在与目标设备交换数据之前,用户设备可以请求目标设备的一个或多个可信属性。 用户设备可以接收目标设备的一个或多个可信任属性,并且基于所接收到的目标设备的一个或多个可信属性来确定要在用于交换的通信信道上强制执行的一个或多个安全策略的集合 用户设备和目标设备之间的数据。 然后可以根据一个或多个安全策略的集合来建立用户设备和目标设备之间的通信信道。
-
公开(公告)号:US20140089261A1
公开(公告)日:2014-03-27
申请号:US14036938
申请日:2013-09-25
申请人: Selim Aissi , Taeho Kgil
发明人: Selim Aissi , Taeho Kgil
IPC分类号: G06F17/30
CPC分类号: G06F17/30578 , G06F11/1461 , G06F11/1464 , G06F17/30082 , G06F17/30117 , G06F17/30368 , G06F17/30575 , G06F21/602 , G06F21/6209 , G06F2201/80 , G06F2201/82 , G06Q20/3223 , G06Q20/36 , G06Q50/01
摘要: Embodiments of the invention are directed to systems and methods for maintaining coherency between different entities in a distributed system. A coherency module automatically detects a change in state in a first entity, wherein the change in state relates to a change in functional code in the first entity. A synchronization message is transmitted to a second entity to synchronize data in the second entity with data in the first entity as a result of the change in state. The second entity is configured to synchronize the data in the second entity with the data in the first entity after receiving the synchronization message.
摘要翻译: 本发明的实施例涉及用于维护分布式系统中的不同实体之间的一致性的系统和方法。 一致性模块自动检测第一实体中的状态变化,其中状态改变涉及第一实体中的功能码的改变。 将同步消息发送到第二实体,以将第二实体中的数据与第一实体中的数据作为状态改变的结果同步。 第二实体被配置为在接收到同步消息之后将第二实体中的数据与第一实体中的数据同步。
-
-
-
-
-
-
-
-
-